Tagged articles
20 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
Apr 30, 2026 · Information Security

20 Essential Server Hardening Steps Before Launching a New Machine

This guide provides a detailed 20‑item checklist for Linux server hardening—covering snapshots, account management, SSH key authentication, password policies, firewall rules, service reduction, kernel tweaks, logging, and verification scripts—to ensure a new production server is secure before it goes live.

AIDEAuditdFail2ban
0 likes · 33 min read
20 Essential Server Hardening Steps Before Launching a New Machine
Black & White Path
Black & White Path
Apr 11, 2026 · Information Security

A Beginner’s Struggle: Securing a Compromised ThinkPHP Site Over Several Days

The author recounts a multi‑day incident response to a ThinkPHP website that was compromised via a weak admin password, detailing how repeated data tampering, hidden scheduled‑task scripts, and a ransom message were investigated, mitigated, and finally contained through systematic hardening and monitoring.

PHPServer HardeningThinkPHP
0 likes · 7 min read
A Beginner’s Struggle: Securing a Compromised ThinkPHP Site Over Several Days
Ops Community
Ops Community
Dec 21, 2025 · Information Security

How to Investigate and Harden a Compromised Linux Server: Real-World Case Study

This guide walks through a real incident where a Linux server was hijacked by a mining virus, detailing step‑by‑step emergency response, systematic forensic investigation, cleanup procedures, and hardening measures to prevent future breaches, complete with scripts and best‑practice recommendations.

RootkitServer Hardeningincident response
0 likes · 26 min read
How to Investigate and Harden a Compromised Linux Server: Real-World Case Study
Ops Community
Ops Community
Aug 27, 2025 · Information Security

Master Apache Security: Complete Guide to Prevent Common Web Attacks

This comprehensive guide walks operations engineers through why Apache security matters, presents core hardening strategies such as hiding server details, blocking directory traversal, enforcing strict security headers, limiting request sizes, and applying IP rate‑limiting, and provides advanced techniques, verification commands, common pitfalls, and an actionable checklist to build a resilient web server.

ApacheConfigurationModSecurity
0 likes · 8 min read
Master Apache Security: Complete Guide to Prevent Common Web Attacks
MaGe Linux Operations
MaGe Linux Operations
Feb 14, 2025 · Information Security

How to Harden Nginx: Essential Security Practices for Safer Web Servers

This guide provides a comprehensive, step‑by‑step hardening roadmap for Nginx, covering version hiding, directory protection, HTTPS enablement, custom error pages, CSP, file permissions, security headers, connection limits, IP whitelisting, SSL optimization, secure file uploads, common attack mitigations, logging best practices, and additional hardening measures to protect web services from a wide range of threats.

CSPHTTPSNginx
0 likes · 31 min read
How to Harden Nginx: Essential Security Practices for Safer Web Servers
Java Tech Enthusiast
Java Tech Enthusiast
Oct 22, 2024 · Information Security

How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall

This guide walks through securing an Ubuntu 20.04 server by updating packages, changing the default SSH port, enforcing strong passwords, creating a non‑root user with sudo, disabling root login, enabling RSA key authentication, configuring the UFW firewall, and blocking ping requests.

Linux securityRSA keysSSH Hardening
0 likes · 9 min read
How to Harden Ubuntu 20.04 Server: SSH, Users, Keys, and Firewall
Liangxu Linux
Liangxu Linux
Oct 20, 2024 · Information Security

How to Install and Use Lynis for Powerful Linux Security Audits

This guide explains how to set up the free, open‑source Lynis tool on a CentOS 8 server, run comprehensive system audits, explore its command‑line options, and interpret the generated security reports to strengthen Linux host defenses.

LynisSecurity AuditingServer Hardening
0 likes · 4 min read
How to Install and Use Lynis for Powerful Linux Security Audits
MaGe Linux Operations
MaGe Linux Operations
Apr 2, 2023 · Information Security

How to Harden SSH on Linux: 8 Essential Security Steps

This guide explains why the default SSH configuration is risky and provides eight practical measures—including disabling root login, changing the default port, restricting password use, and employing key‑based authentication—to secure SSH access on Linux servers.

SSHSecurityServer Hardening
0 likes · 6 min read
How to Harden SSH on Linux: 8 Essential Security Steps
Liangxu Linux
Liangxu Linux
Aug 29, 2022 · Information Security

How to Harden SSH on Linux: 8 Essential Security Tweaks

This guide walks you through eight practical steps to secure SSH on a Linux server, including disabling root login, changing the default port, restricting empty passwords, limiting authentication attempts, enforcing protocol 2, disabling forwarding, using key‑based authentication, and applying IP‑based access controls.

ConfigurationSSHSecurity
0 likes · 7 min read
How to Harden SSH on Linux: 8 Essential Security Tweaks
MaGe Linux Operations
MaGe Linux Operations
Aug 5, 2022 · Information Security

Secure Your Linux Server: 8 Essential SSH Hardening Steps

Learn how to protect your Linux server by disabling root SSH login, changing the default port, enforcing strong passwords, limiting login attempts, using SSH protocol 2, disabling forwarding, employing key‑based authentication, and restricting access by IP, with clear commands and configuration examples.

Linux securitySSHServer Hardening
0 likes · 6 min read
Secure Your Linux Server: 8 Essential SSH Hardening Steps
Open Source Linux
Open Source Linux
Jul 27, 2022 · Information Security

How to Harden SSH on Linux: 8 Essential Security Steps

This guide explains why the default SSH configuration on Linux is risky and provides eight concrete hardening measures—including disabling root login, changing the default port, enforcing key‑based authentication, limiting login attempts, and restricting access by IP—to secure your server against common attacks.

Linux securityServer Hardeningaccess control
0 likes · 8 min read
How to Harden SSH on Linux: 8 Essential Security Steps
Liangxu Linux
Liangxu Linux
Nov 30, 2020 · Information Security

How to Install and Use Lynis for Automated Linux Security Audits

This guide explains what Lynis is, walks through installing it on CentOS 8, and demonstrates how to run full system audits, select specific test groups, and view detailed results, helping administrators harden Linux servers with a free open‑source tool.

LynisServer Hardeningcommand-line
0 likes · 5 min read
How to Install and Use Lynis for Automated Linux Security Audits
Liangxu Linux
Liangxu Linux
Jun 2, 2020 · Information Security

Step-by-Step Guide to Harden CentOS 7.7 Server Security

This article provides a comprehensive, step‑by‑step tutorial for hardening a CentOS 7.7 server, covering complex password creation, password‑policy configuration, PAM strength settings, login‑attempt limits, disabling root SSH access, changing the SSH port, tightening security‑group rules, command‑history limits, log monitoring, and regular data backup procedures.

CentOSPassword policySSH Security
0 likes · 6 min read
Step-by-Step Guide to Harden CentOS 7.7 Server Security
Open Source Linux
Open Source Linux
May 27, 2020 · Information Security

How to Harden a CentOS 7.7 Server: Essential Security Steps

This guide walks you through essential CentOS 7.7 server hardening steps—including setting complex passwords, configuring password policies, enforcing password strength, limiting login attempts, disabling root SSH access, changing SSH ports, tightening firewall rules, managing command history, monitoring logs, and scheduling regular backups—to improve system security.

CentOSPassword policySSH Security
0 likes · 5 min read
How to Harden a CentOS 7.7 Server: Essential Security Steps
dbaplus Community
dbaplus Community
Sep 21, 2017 · Information Security

How I Detected and Fixed a Shellshock Attack on a Linux Server

After a sudden server crash, the author traced a ransomware note, uncovered a Bash Shellshock exploit through log analysis and crafted GET requests, verified the vulnerability, upgraded Bash, and applied post‑compromise hardening steps to fully recover the system.

Bash vulnerabilityLinux securityServer Hardening
0 likes · 11 min read
How I Detected and Fixed a Shellshock Attack on a Linux Server
Tencent Cloud Developer
Tencent Cloud Developer
Mar 1, 2017 · Information Security

MySQL Ransomware Attacks: Security Analysis and Hardening Guide

MySQL has become a ransomware target because many servers expose the database to the internet with empty or weak passwords, so administrators should audit open ports, enforce strong authentication, restrict access via security groups or iptables, bind services to internal IPs, and avoid using root or high‑privilege accounts to harden MySQL, MongoDB, and Redis against compromise.

Database SecurityMongoDB hardeningMySQL security
0 likes · 8 min read
MySQL Ransomware Attacks: Security Analysis and Hardening Guide
MaGe Linux Operations
MaGe Linux Operations
Apr 29, 2016 · Information Security

How to Analyze and Recover from a Linux Rootkit Intrusion

This article walks through a real-world Linux server compromise, detailing the attack symptoms, forensic analysis steps, rootkit discovery, exploitation of an Awstats script vulnerability, and practical remediation measures to restore and harden the affected system.

AwstatsForensicsRootkit
0 likes · 14 min read
How to Analyze and Recover from a Linux Rootkit Intrusion